1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alik [6]
3 years ago
5

List and describe at least two (2) very specific advantages of the CIF approach for enterprise-scale data warehousing for this c

ompany
Computers and Technology
1 answer:
tresset_1 [31]3 years ago
7 0

Answer:

di ko po alam pa help po

Explanation:

pllssss

You might be interested in
If your cousin wanted to view information from the world wide web, what application software would you tell her to be sure she h
MAVERICK [17]
Well, I would say a web browser, like Mozilla Firefox, Safari for IOS, Windows Edge, Chrome, or Internet Explorer; and some anti-malware software, since there are multiple websites on the WWW that try to steal your information and give your device viruses.
6 0
3 years ago
A(n) __________ employs a method called "tunneling" in which each packet from the sending computer is encapsulated within anothe
Hitman42 [59]
<span>Virtual Private Network employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the internet.Tunneling protocol allows a network user to access or provide a network service that the underlying network does not support or provide directly</span>
7 0
3 years ago
What specific type of hardware card inserts into a web server that contains one or more co-processors to handle ssl/tls processi
o-na [289]
A <span>specific type of hardware card which is inserted into a web server that contains one or more co-processors to handle ssl/tls processing is 
</span>SSL/TLS Accelerator.
8 0
4 years ago
If you wouldn't want someone to photograph you doing something, don't photograph someone else in that situation either. True Fal
Sunny_sXe [5.5K]

In the United States, it's illegal for a photographer to use someone's likeness ... Model release forms contain conditions on working with people, and in some ... You'll need this release form if you want to publish photos of another person's ... If you don't want to take any legal risks, then use a photo release form to be safe.

4 0
3 years ago
Describe the key differences between raster-based and vector-based graphics.
Kazeer [188]

Answer:

asd

Explanation:

8 0
3 years ago
Other questions:
  • "bing ads keyword planner allows you to search for new keywords using a phrase, website, or category. from which bing ads tabs c
    13·1 answer
  • Using-R,-create-a-linear-model-to-represent-the-coefficients-for-the-objects-fw2-and-fwe-data..
    10·1 answer
  • What special precautions should you take when detailing a steel-framed building to avoid excessive conduction of heat through th
    9·1 answer
  • A group of students writes their names and unique student ID numbers on sheets of paper. The sheets are then randomly placed in
    15·1 answer
  • Help me! I’ll mark you brainly
    13·1 answer
  • True or False. The 'C' programming language guarantees that R0 will always contain a zero value on the ATmega328P
    6·1 answer
  • An interactive online representation of geospatial data, which can be accesses via a Web browser is a(an): a. Web Application b.
    11·1 answer
  • 10. Site-to-Site VPN architecture is also known as
    6·1 answer
  • Advantages and disadvantages of a watch tower​
    15·1 answer
  • Which sql keyword is used to retrieve a minimum value from an attribute in a table
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!